Tag

Packet Analysis

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
Dec 2, 2024 · Backend Development

Debugging a TCP Packet Length Bug That Blocks Production at 70% Progress

The article analyzes a mysterious production stall caused by a TCP communication bug where the D4 and D5 stages are merged, leading to a mis‑aligned length field that makes the server read an incorrect payload size, and presents two concrete fixes.

BackendMinaPacket Analysis
0 likes · 11 min read
Debugging a TCP Packet Length Bug That Blocks Production at 70% Progress
Wukong Talks Architecture
Wukong Talks Architecture
Oct 25, 2024 · Backend Development

Debugging a TCP Communication Bug That Stops Device Production at 70% Due to Length Field Misalignment

The article details a mysterious production stall at 70% caused by a TCP packet length field misalignment when the configuration name is "rabbit‑TD", explains the step‑by‑step investigation using server logs and packet captures, identifies the root cause of the merged D4/D5 packets, and proposes two concrete fixes to correct the length handling.

BackendPacket AnalysisTCP
0 likes · 10 min read
Debugging a TCP Communication Bug That Stops Device Production at 70% Due to Length Field Misalignment
Practical DevOps Architecture
Practical DevOps Architecture
Aug 15, 2024 · Information Security

Using tcpdump on Linux for Network Packet Capture: Commands and Tips

This guide explains how to use tcpdump on Linux to capture all traffic, filter by IP or port, save to files, read pcap files, and apply advanced filters, while highlighting important security, permission, and storage considerations.

Command LineLinuxPacket Analysis
0 likes · 4 min read
Using tcpdump on Linux for Network Packet Capture: Commands and Tips
Efficient Ops
Efficient Ops
Dec 5, 2022 · Operations

Mastering tcpdump: Essential Commands for Network Packet Capture and Analysis

This guide explains how to use tcpdump for capturing and filtering network packets on Linux, covering basic usage, interface selection, host and port filters, protocol-specific captures, combined expressions, limiting capture size, saving to files, and a practical troubleshooting scenario with nginx and Node.js.

Command LineLinuxPacket Analysis
0 likes · 7 min read
Mastering tcpdump: Essential Commands for Network Packet Capture and Analysis
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 30, 2022 · Fundamentals

Understanding TCP Protocol and Packet Analysis with Wireshark

This article explains how to visualize and dissect TCP/IP packet structures using Wireshark, walks through each OSI/TCP‑IP layer, and details the fields of the TCP header such as ports, sequence numbers, flags, and checksum, providing a practical understanding of network protocol fundamentals.

Packet AnalysisTCPTCP/IP Model
0 likes · 9 min read
Understanding TCP Protocol and Packet Analysis with Wireshark
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Detailed HTTPS Handshake Analysis Using Wireshark

This article explains the HTTPS protocol, its security advantages over HTTP, and provides a step‑by‑step Wireshark packet capture and analysis of a test website, covering TCP three‑way handshake, TLS ClientHello/ServerHello, certificate verification, key exchange, and encrypted data transmission.

Packet AnalysisTLSTLS Handshake
0 likes · 15 min read
Detailed HTTPS Handshake Analysis Using Wireshark
Ops Development Stories
Ops Development Stories
Aug 18, 2021 · Information Security

How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy

This guide demonstrates how to use Python's Scapy library to extract IP addresses from PCAP files, sniff usernames and passwords from mail traffic, discover live hosts via SYN packets, launch MAC address table flooding attacks, and conduct ARP spoofing for man‑in‑the‑middle attacks, providing complete code examples.

ARP spoofingMAC FloodMITM
0 likes · 7 min read
How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy
ByteDance Dali Intelligent Technology Team
ByteDance Dali Intelligent Technology Team
Jun 24, 2021 · Fundamentals

A Comprehensive Analysis of the HTTP/2 Protocol: Architecture, Optimizations, and Practical Packet Capture Insights

This article provides a comprehensive technical analysis of the HTTP/2 protocol, detailing its architectural improvements over HTTP/1.1, including HPACK header compression, binary framing, stream multiplexing, and server push, while demonstrating practical packet capture techniques to illustrate its performance optimizations.

Binary FramingHPACK CompressionHTTP/2
0 likes · 15 min read
A Comprehensive Analysis of the HTTP/2 Protocol: Architecture, Optimizations, and Practical Packet Capture Insights
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 18, 2020 · Databases

Analyzing MySQL Replication Heartbeat Incompatibility Caused by Large Binlog Transactions

The article investigates why MySQL replication reports the error “heartbeat is not compatible with local info” when large transactions exceed the 4 GB limit of the binlog's next_position field, reproduces the issue with a controlled experiment, analyzes packet structures, and proposes practical mitigation strategies.

MySQLPacket AnalysisReplication
0 likes · 7 min read
Analyzing MySQL Replication Heartbeat Incompatibility Caused by Large Binlog Transactions
Top Architect
Top Architect
Dec 17, 2020 · Operations

Understanding SLB (Server Load Balancer) Transmission Modes and Packet Analysis

This article explains the background of Server Load Balancing (SLB), describes its three transmission modes—reverse‑proxy, transparent, and triangular—and provides detailed packet‑level analysis of TCP/HTTP interactions for each mode, highlighting configuration nuances and security considerations.

NetworkPacket AnalysisSLB
0 likes · 11 min read
Understanding SLB (Server Load Balancer) Transmission Modes and Packet Analysis
Xueersi Online School Tech Team
Xueersi Online School Tech Team
Nov 6, 2020 · Databases

MySQL Protocol Analysis and Source Code Exploration

This article provides a detailed walkthrough of MySQL protocol analysis using Wireshark, covering SSL disabling, packet capture commands, step‑by‑step examination of handshake, authentication, database selection, query execution packets, and an in‑depth look at related source‑code functions and command enums.

MySQLPacket AnalysisProtocol
0 likes · 15 min read
MySQL Protocol Analysis and Source Code Exploration
JD Tech Talk
JD Tech Talk
Aug 28, 2019 · Fundamentals

Understanding ARP and ICMP Protocols: Principles and Packet Analysis

This article explains the fundamentals of the ARP (Address Resolution Protocol) and ICMP (Internet Control Message Protocol), describing how they operate in LAN environments, detailing their packet structures, and illustrating their practical use through ping and tracert commands with packet capture analysis.

ARPICMPPacket Analysis
0 likes · 7 min read
Understanding ARP and ICMP Protocols: Principles and Packet Analysis
Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSPacket AnalysisTCP reflection
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
360 Tech Engineering
360 Tech Engineering
Apr 19, 2019 · Fundamentals

OSI, IP, UDP Overview and Building a Local UDP Server/Client with Python

This article introduces the OSI model, IP and UDP protocols, explains the structure of IP and UDP packet headers, demonstrates how to create a simple UDP server and client in Python, and shows how to capture and analyze the traffic with Wireshark.

IPNetwork ProgrammingOSI model
0 likes · 10 min read
OSI, IP, UDP Overview and Building a Local UDP Server/Client with Python